Searched defs:len (Results 701 - 725 of 5216) sorted by last modified time

<<21222324252627282930>>

/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_aka.c271 size_t len; local
287 len = wpabuf_len(data->id_msgs);
288 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA: AT_CHECKCODE data", addr, len);
290 sha256_vector(1, &addr, &len, hash);
292 sha1_vector(1, &addr, &len, hash);
304 size_t len; local
333 len = wpabuf_len(data->id_msgs);
335 sha256_vector(1, &addr, &len, hash);
337 sha1_vector(1, &addr, &len, hash);
655 size_t len; local
1183 size_t len; local
1256 eap_aka_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
1273 eap_aka_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_eke.c387 size_t len; local
391 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_EKE, respData, &len);
392 if (pos == NULL || len < 1) {
689 size_t len; local
692 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_EKE, respData, &len);
693 if (pos == NULL || len < 1)
697 end = pos + len;
726 static u8 * eap_eke_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
738 *len = EAP_MSK_LEN;
744 static u8 * eap_eke_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_fast.c120 static int eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, argument
136 ticket, len);
138 if (len < 4 || WPA_GET_BE16(ticket) != PAC_TYPE_PAC_OPAQUE) {
147 pac_opaque_len > len - 4) {
149 "(len=%lu left=%lu)",
151 (unsigned long) len);
805 pac_info->len = host_to_be16(pos - (u8 *) (pac_info + 1));
825 "(len=%d) with last Phase 1 Message (len=%d "
926 size_t len; local
1092 size_t len; local
1128 size_t len; local
1229 eap_fast_pac_type(u8 *pac, size_t len, u16 type) argument
1265 u16 type, len, res; local
1548 eap_fast_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
1567 eap_fast_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_gpsk.c105 size_t len; local
118 len = 1 + 2 + sm->server_id_len + EAP_GPSK_RAND_LEN + 2 +
120 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len,
146 size_t len, miclen; local
153 len = 1 + 2 * EAP_GPSK_RAND_LEN + 2 + sm->server_id_len +
155 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len,
214 size_t len; local
216 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GPSK, respData, &len);
217 if (pos == NULL || len < 1) {
529 size_t len; local
553 eap_gpsk_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
571 eap_gpsk_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_gtc.c81 size_t len; local
83 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &len);
84 if (pos == NULL || len < 1) {
H A Deap_server_identity.c86 size_t len; local
89 respData, &len);
104 size_t len; local
118 respData, &len);
122 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len);
123 buf = os_malloc(len * 4 + 1);
125 printf_encode(buf, len * 4 + 1, pos, len);
132 sm->identity = os_malloc(len ? len
[all...]
H A Deap_server_ikev2.c186 size_t len = wpabuf_len(req); local
190 msg, len, wpabuf_put(req, icv_len));
244 size_t len; local
247 &len);
281 const u8 *buf, size_t len)
284 if (len > wpabuf_tailroom(data->in_buf)) {
290 wpabuf_put_data(data->in_buf, buf, len);
292 "bytes more", (unsigned long) len,
301 const u8 *buf, size_t len)
318 wpabuf_put_data(data->in_buf, buf, len);
280 eap_ikev2_process_cont(struct eap_ikev2_data *data, const u8 *buf, size_t len) argument
299 eap_ikev2_process_fragment(struct eap_ikev2_data *data, u8 flags, u32 message_length, const u8 *buf, size_t len) argument
350 size_t len; local
478 eap_ikev2_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
496 eap_ikev2_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_md5.c80 size_t len; local
82 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &len);
83 if (pos == NULL || len < 1) {
87 if (*pos != CHAP_MD5_LEN || 1 + CHAP_MD5_LEN > len) {
90 *pos, (unsigned long) len);
118 pos++; /* Skip response len */
H A Deap_server_mschapv2.c245 size_t len; local
248 &len);
249 if (pos == NULL || len < 1) {
288 size_t len, name_len, i; local
296 &len);
297 if (pos == NULL || len < 1)
300 end = pos + len;
304 if (len < sizeof(*resp) + 1 + 49 ||
442 size_t len; local
445 &len);
469 size_t len; local
526 eap_mschapv2_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_pax.c189 size_t len, mlen; local
192 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PAX, respData, &len);
193 if (pos == NULL || len < sizeof(*resp)) {
198 mlen = sizeof(struct eap_hdr) + 1 + len;
207 (u8 *) (resp + 1), len - sizeof(*resp) - EAP_PAX_ICV_LEN);
261 if (len - sizeof(*resp) < EAP_PAX_ICV_LEN) {
290 size_t len, left, cid_len; local
298 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PAX, respData, &len);
299 if (pos == NULL || len < sizeof(*resp) + EAP_PAX_ICV_LEN)
304 left = len
462 size_t len; local
495 eap_pax_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
516 eap_pax_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_peap.c372 size_t len[2]; local
393 len[0] = 60;
395 len[1] = 1;
410 addr[0], len[0]);
412 addr[1], len[1]);
413 hmac_sha1_vector(data->cmk, 20, 2, addr, len, mac);
527 size_t len; local
529 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PEAP, respData, &len);
530 if (pos == NULL || len < 1) {
699 "(len
1001 size_t len; local
1175 eap_peap_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_psk.c178 size_t len; local
182 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, respData, &len);
183 if (pos == NULL || len < 1) {
203 if ((t == 1 && len < sizeof(struct eap_psk_hdr_2)) ||
204 (t == 3 && len < sizeof(struct eap_psk_hdr_4))) {
356 "PSK-4 (len=%lu, expected 21)",
414 size_t len; local
423 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, respData, &len);
424 if (pos == NULL || len < 1)
445 static u8 * eap_psk_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
463 eap_psk_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_pwd.c429 size_t len; local
490 len = wpabuf_len(data->outbuf) - data->out_frag_pos;
491 if ((len + EAP_PWD_HDR_SIZE) > data->mtu) {
492 len = data->mtu - EAP_PWD_HDR_SIZE;
502 len -= sizeof(u16);
507 (int) len);
514 EAP_PWD_HDR_SIZE + len +
527 wpabuf_put_data(req, buf + data->out_frag_pos, len);
528 data->out_frag_pos += len;
547 size_t len; local
869 size_t len; local
971 eap_pwd_getkey(struct eap_sm *sm, void *priv, size_t *len) argument
990 eap_pwd_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_sake.c240 size_t len; local
244 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_SAKE, respData, &len);
245 if (pos == NULL || len < sizeof(struct eap_sake_hdr)) {
415 size_t len; local
418 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_SAKE, respData, &len);
419 if (pos == NULL || len < sizeof(struct eap_sake_hdr))
423 end = pos + len;
455 static u8 * eap_sake_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
467 *len = EAP_MSK_LEN;
473 static u8 * eap_sake_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_sim.c350 size_t len; local
352 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_SIM, respData, &len);
353 if (pos == NULL || len < 3) {
716 size_t len; local
719 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_SIM, respData, &len);
720 if (pos == NULL || len < 3)
723 end = pos + len;
782 static u8 * eap_sim_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
794 *len = EAP_SIM_KEYING_DATA_LEN;
799 static u8 * eap_sim_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_tls.c197 size_t len; local
202 &len);
206 &len);
209 respData, &len);
210 if (pos == NULL || len < 1) {
251 static u8 * eap_tls_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
263 *len = EAP_TLS_KEY_LEN;
274 static u8 * eap_tls_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
295 *len = EAP_EMSK_LEN;
H A Deap_server_tls_common.c101 char *label, size_t len)
106 out = os_malloc(len);
110 if (tls_connection_prf(sm->ssl_ctx, data->conn, label, 0, out, len) ==
130 keys.server_random_len, out, len))
217 const u8 *buf, size_t len)
220 if (len > wpabuf_tailroom(data->tls_in)) {
225 wpabuf_put_data(data->tls_in, buf, len);
227 "bytes more", (unsigned long) len,
236 const u8 *buf, size_t len)
256 if (len > message_lengt
100 eap_server_tls_derive_key(struct eap_sm *sm, struct eap_ssl_data *data, char *label, size_t len) argument
216 eap_server_tls_process_cont(struct eap_ssl_data *data, const u8 *buf, size_t len) argument
234 eap_server_tls_process_fragment(struct eap_ssl_data *data, u8 flags, u32 message_length, const u8 *buf, size_t len) argument
[all...]
H A Deap_server_tnc.c328 size_t len; local
331 &len);
337 if (len == 0 && data->state != WAIT_FRAG_ACK) {
342 if (len == 0)
398 const u8 *buf, size_t len)
401 if (len > wpabuf_tailroom(data->in_buf)) {
407 wpabuf_put_data(data->in_buf, buf, len);
409 "bytes more", (unsigned long) len,
418 const u8 *buf, size_t len)
435 wpabuf_put_data(data->in_buf, buf, len);
397 eap_tnc_process_cont(struct eap_tnc_data *data, const u8 *buf, size_t len) argument
416 eap_tnc_process_fragment(struct eap_tnc_data *data, u8 flags, u32 message_length, const u8 *buf, size_t len) argument
451 size_t len; local
[all...]
H A Deap_server_ttls.c78 int mandatory, size_t len)
96 ((u32) (hdrlen + len)));
172 "(len=%d, left=%d) - dropped",
303 struct eap_ttls_data *data, size_t len)
306 len);
486 size_t len; local
488 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TTLS, respData, &len);
489 if (pos == NULL || len < 1) {
537 "(challenge len %lu password len
77 eap_ttls_avp_hdr(u8 *avphdr, u32 avp_code, u32 vendor_id, int mandatory, size_t len) argument
302 eap_ttls_implicit_challenge(struct eap_sm *sm, struct eap_ttls_data *data, size_t len) argument
907 size_t len; local
1154 eap_ttls_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_vendor_test.c95 size_t len; local
97 pos = eap_hdr_validate(EAP_VENDOR_ID, EAP_VENDOR_TYPE, respData, &len);
98 if (pos == NULL || len < 1) {
112 size_t len; local
114 pos = eap_hdr_validate(EAP_VENDOR_ID, EAP_VENDOR_TYPE, respData, &len);
115 if (pos == NULL || len < 1)
140 static u8 * eap_vendor_test_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
155 *len = key_len;
H A Deap_server_wsc.c277 size_t len; local
280 respData, &len);
281 if (pos == NULL || len < 2) {
291 const u8 *buf, size_t len, u8 op_code)
302 if (len > wpabuf_tailroom(data->in_buf)) {
308 wpabuf_put_data(data->in_buf, buf, len);
310 "bytes more", (unsigned long) len,
319 const u8 *buf, size_t len)
337 wpabuf_put_data(data->in_buf, buf, len);
340 (unsigned long) len,
290 eap_wsc_process_cont(struct eap_wsc_data *data, const u8 *buf, size_t len, u8 op_code) argument
317 eap_wsc_process_fragment(struct eap_wsc_data *data, u8 flags, u8 op_code, u16 message_length, const u8 *buf, size_t len) argument
353 size_t len; local
[all...]
H A Deap_sim_db.c809 size_t len)
813 if (send(data->sock, msg, len, 0) < 0) {
827 if (send(data->sock, msg, len, 0) < 0) {
875 int len, ret; local
926 len = os_snprintf(msg, sizeof(msg), "SIM-REQ-AUTH ");
927 if (len < 0 || len + imsi_len >= sizeof(msg))
929 os_memcpy(msg + len, imsi, imsi_len);
930 len += imsi_len;
931 ret = os_snprintf(msg + len, sizeo
808 eap_sim_db_send(struct eap_sim_db_data *data, const char *msg, size_t len) argument
1340 int len; local
1450 int len, ret; local
[all...]
H A Dikev2.c45 size_t len[2]; local
91 len[0] = pad_len;
93 len[1] = wpabuf_len(shared);
95 2, addr, len, skeyseed) < 0) {
801 wpa_printf(MSG_MSGDUMP, "IKEV2: Received message (len %lu)",
H A Dtncs.c514 const u8 *msg, size_t len)
519 wpa_hexdump_ascii(MSG_MSGDUMP, "TNC: Message to IMV(s)", msg, len);
529 (TNC_BufferReference) msg, len,
598 size_t len = 0; local
601 len += tncs->imv_data[i].imv_send_len;
603 len += os_strlen(tncs->tncs_message);
604 return len;
625 size_t len = os_strlen(tncs->tncs_message); local
626 os_memcpy(pos, tncs->tncs_message, len);
627 pos += len;
513 tncs_send_to_imvs(struct tncs_data *tncs, unsigned int type, const u8 *msg, size_t len) argument
780 tncs_process_if_tnccs(struct tncs_data *tncs, const u8 *msg, size_t len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_auth/
H A Deapol_auth_sm.c1015 static const char * eapol_sm_get_eap_req_id_text(void *ctx, size_t *len) argument
1018 *len = sm->eapol->conf.eap_req_id_text_len;

Completed in 274 milliseconds

<<21222324252627282930>>